Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
76 - 100 of 1846 Matches Previous Page  |  Next Page
2017 Global Security Report
sponsored by Trustwave
RESEARCH CONTENT: The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Trustwave

Remediation and Mitigation for Windows Active Directory Security
sponsored by Quest
WHITE PAPER: Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Quest

Protecting the Hybrid Cloud from Advanced Threats
sponsored by TrendMicro
WHITE PAPER: With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

TrendMicro

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

How to Balance Performance and Security When Connecting Branch Offices to the Public Cloud
sponsored by Cisco Umbrella
RESEARCH CONTENT: This Gartner report explores 5 recommendations for solving 2 app performance challenges, network performance key considerations, security policy considerations, tips to help you determine the right approach for your organization, and more.
Posted: 10 Aug 2017 | Published: 17 Oct 2016

Cisco Umbrella

Stopping the Next Ransomware Outbreak
sponsored by Carbon Black
WHITE PAPER: The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.
Posted: 10 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Cost of Cyber Crime Study
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.
Posted: 09 Aug 2017 | Published: 31 Oct 2016

Hewlett Packard Enterprise

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT: This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Symantec

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

The Future of Threat and Vulnerability Management
sponsored by BMC
RESEARCH CONTENT: In this Gartner research report, read 3 analyst predictions for the vulnerability management market. Discover key findings, market implications, and recommendations to improve your security posture.
Posted: 07 Aug 2017 | Published: 14 Nov 2016

BMC

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

PASSIVE Voice Biometrics in ACTIVE Channels
sponsored by NICE Systems, Inc
RESEARCH CONTENT: Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Compliance As Code - A Visual Guide
sponsored by Flux7
WHITE PAPER: Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Flux7

How SecOps Addresses Critical Security Vulnerabilities
sponsored by BMC
WHITE PAPER: The rising number of devices connected to any given network, combined with common breakdown in communication between security and operations, creates a huge vulnerability problem. Use this white paper to find out how you can get your SecOps back on track.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

BMC
76 - 100 of 1846 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement